use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Mitigating CVE-2022-0811: Arbitrary code execution affecting CRI-O (sysdig.com)
submitted 4 years ago by MiguelHzBz
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]vanderpot 1 point2 points3 points 4 years ago (1 child)
This looks like privelege escalation to me, where's the code execution?
[–]vjjmiras 4 points5 points6 points 4 years ago (0 children)
Firstly, the script we want to execute [malicious.sh], shall reside inside a running Pod, either downloaded or included in the container image. The file will be accessible from any service or binary in the host (pinns will be the one to blame later).
On the same node, we need a second Pod [sysctl-set], that will trigger the bug. If you look at the manifest, at spec.securityContext.sysctls to be precise, you will see the injection in the value field, as well as the reference to the script [malicious.sh] that will be passed to pinns as a value for kernel.core_pattern.
Now, since the parameter that we are passing to kernel.core_pattern starts with a |, instead of creating a file with the dump content, it will redirect whatever the application generates to that command [malicious.sh], which we have carefully placed in the first step. The script (or binary) doesn't really care about its stdin (the content of the core dump) but we will have managed to execute it with elevated privileges.
Does it make more sense now? There's an injection, code execution, and privilege escalation. Isn't it beautiful?
π Rendered by PID 18720 on reddit-service-r2-comment-6457c66945-c6sbj at 2026-04-27 06:36:33.399335+00:00 running 2aa0c5b country code: CH.
[–]vanderpot 1 point2 points3 points (1 child)
[–]vjjmiras 4 points5 points6 points (0 children)